A free and open source interactive HTTPS proxy
A tool that allows you to create vulnerable environments
Web application fuzzer
Automatic SQL injection and database takeover tool
Set of tools to audit SIP based VoIP Systems
A collection of Python classes for working with network protocols
Utilize all available CPU cores for accepting new client connections
Distro Penetrasing Live System Burn to USB Flash Disk & Run.
CTFs as you need them
The AWS exploitation framework, designed for testing security
Cell-by-cell testing for production Jupyter notebooks in JupyterLab
Server for security audits supporting public key authentication
RDP monster-in-the-middle (mitm) and library for Python
A bleeding-edge, security-centric Arch-based Linux distribution.
This tools implements a RansomWare (cryptolocker, exfiltration, ...).
a bruteforcer that can crack variety of files such as zip,rar & more
A custom Debian live ISO with security tools, no GUI, only Bash.
A anti-phishing Python script with headers and proxies!
Powerful framework for rogue access point attack
Multi-core image resizer and rotator. Go crunch 'em!
A swiss army knife for pentesting networks
Portable Penetration Testing Operating System
A collection of custom security tools for quick needs.
Automating Host Exploitation with AI